Ethical Hacking Scanning and Enumeration
After the footprinting phase, you will have gathered enough general information about the target to begin digging deeper to get the finer details about what you have found. This next stage, called the scanning and enumeration phase, takes some of the previously acquired information and processes it further. Here, we get information about the ports available, the running services, and the network.
In this chapter, we will determine what systems are on the network (also known as live systems) and reachable. We will also look at what systems listen for connections and discuss enumeration, using a variety of tools and techniques.
We will cover the following topics in this chapter:
- Comparing scanning and enumeration
- Exploring scanning techniques
- Understanding service enumeration
- Introducing the Nmap network scanning tool
- Lab – scanning and enumeration